On Wed, Sep 17, 2025 at 05:01:48PM -0300, Jason Gunthorpe wrote:
> If something holds a refcount then it is at risk of UAFing. For abort
> paths we expect the caller to never share the object with a parallel
> thread and to clean up any refcounts it obtained on its own.
>
> Add the missing dec inside iommufd_hwpt_paging_alloc()during error unwind
Space between "()" and "during"
And I don't see this patch touch iommufd_hwpt_paging_alloc(). Is
that the iommufd_object_abort() part with the WARN_ON?
> by making iommufd_hw_pagetable_attach/detach() proper pairs.
----
> diff --git a/drivers/iommu/iommufd/iommufd_private.h
> b/drivers/iommu/iommufd/iommufd_private.h
> index 0da2a81eedfa8b..627f9b78483a0e 100644
> --- a/drivers/iommu/iommufd/iommufd_private.h
> +++ b/drivers/iommu/iommufd/iommufd_private.h
> @@ -454,9 +454,8 @@ static inline void iommufd_hw_pagetable_put(struct
> iommufd_ctx *ictx,
> if (hwpt->obj.type == IOMMUFD_OBJ_HWPT_PAGING) {
> struct iommufd_hwpt_paging *hwpt_paging = to_hwpt_paging(hwpt);
>
> - lockdep_assert_not_held(&hwpt_paging->ioas->mutex);
> -
> if (hwpt_paging->auto_domain) {
> + lockdep_assert_not_held(&hwpt_paging->ioas->mutex);
> iommufd_object_put_and_try_destroy(ictx, &hwpt->obj);
> return;
> }
Hmm, this patch doesn't change the scope of ioas-mutex?
And it seems that both callers of iommufd_hw_pagetable_put() don't
hold the ioas->mutex?
Thanks
Nicolin